A study of computer based data security techniques
Lupton, William Lloydd
Barksdale, G.L. Jr.
MetadataShow full item record
This essay presents the results of a study which surveyed the various aspects of system security hardware, software, and procedural techniques in use in current and proposed automated systems. Its impetus is from the concern for security control that has been generated by the increasing number of time-sharing and resource-sharing systems. The intention is to present the designers, managers, programmers, system implementers, and operational personnel with a consolidated source of data concerning security techniques and wit h a tool to evaluate the data and select the techniques applicable to their respective security requirements.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Pao, Hua-Fu (Monterey, California. Naval Postgraduate School, 1993-06);This thesis considers the security management issue of electronic data interchange (EDI) and the security tools that are used for secure EDI implementation. Management considerations of EDI are considered to be an integration ...
Larson, Dale Leslie (Monterey, California. Naval Postgraduate School, 1974-06);This thesis presents a wide spectrum of computer data security, including both practical and theoretical aspects of the subject. It was motivated by the concern for the general lack of adequate knowledge, techniques, ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2005-09);September 2005. Welcome to the second issue of Homeland Security Affairs. The central theme is Hurricane Katrina. We also offer articles about critical infrastructure protection and capabilities based planning. One of ...